摘要:
A method, non-transistory computer readable medium and system for dynamically assigning a request for wireless communication service are disclosed. For example, the method receives the request for wireless communication service from a mobile device, and forwards the request to a plurality of wireless network service providers to solicit at least one bid for servicing the request. The method receives the at least one bid from the plurality of wireless network service providers to service the request, and determines by a coordinating device a winning bid from the at least one bid. The method then assigns a wireless network service provider from the plurality of wireless network service providers to service the request, wherein the assigned wireless network service provider is associated with the winning bid.
摘要:
A method, non-transistory computer readable medium and system for dynamically assigning a request for wireless communication service are disclosed. For example, the method receives the request for wireless communication service from a mobile device, and forwards the request to a plurality of wireless network service providers to solicit at least one bid for servicing the request. The method receives the at least one bid from the plurality of wireless network service providers to service the request, and determines by a coordinating device a winning bid from the at least one bid. The method then assigns a wireless network service provider from the plurality of wireless network service providers to service the request, wherein the assigned wireless network service provider is associated with the winning bid.
摘要:
The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
摘要:
The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
摘要:
Methods, systems, and products answer questions using heuristics. A question and an input are received. A set of heuristic rules is retrieved, and the question is answered by evaluating an accuracy of each heuristic rule. Multiple accuracies from the set of heuristic rules are combined to produce a confidence level for the answer to the question.
摘要:
Disclosed are a system, method and computer-readable medium for organizing images. A method aspect relates to receiving an image into a device, receiving incidental information associated with the image, organizing the image and the incidental information into a data structure such as a sparse array, classifying the received image with an image classifier and storing the classified image in an image database, receiving a search query and responding to the search query by searching for and retrieving matching images in the image database based on a comparison of the image search query to the data structure.
摘要:
Methods and apparatus for discovering hosts on an Internet Protocol (IP) version 6 (IPv6) network are disclosed. An example implementation includes probing a network to determine an Internet Protocol (IP) version 4 (IPv4) address that is in use on the network; determining a Media Access Control (MAC) address associated with the IPv4 address; determining a local-prefix; determining a first IP version 6 (IPv6) address, the first IPv6 address including the MAC address and the local-prefix; determining a second IPv6 address, the second IPv6 address including the MAC address and the local-prefix and the second IPv6 address being different than the first IPv6 address; probing the network to determine if the first IPv6 address is in use; probing the network to determine if the second IPv6 address is in use; and storing an indication of whether at least one of the first or second IPv6 address is in use.
摘要:
Methods, systems, and products authenticate a user to a device. A user selects or submits a media file for authentication. Features in the media file are compared to a set of criteria for authentication. The number of matching criteria, that are within a range of values for each criterion in the set of criteria, are determined. The number of matching criteria is compared to a threshold value. When the number of matching criteria equals or exceeds the threshold value, then the user that selected or submitted the media file is authenticated.
摘要:
Methods and apparatus for discovering hosts on an Internet Protocol (IP) version 6 (IPv6) network are disclosed. An example implementation includes probing a network to determine an Internet Protocol (IP) version 4 (IPv4) address that is in use on the network; determining a Media Access Control (MAC) address associated with the IPv4 address; determining a local-prefix; determining a first IP version 6 (IPv6) address, the first IPv6 address including the MAC address and the local-prefix; determining a second IPv6 address, the second IPv6 address including the MAC address and the local-prefix and the second IPv6 address being different than the first IPv6 address; probing the network to determine if the first IPv6 address is in use; probing the network to determine if the second IPv6 address is in use; and storing an indication of whether at least one of the first or second IPv6 address is in use.
摘要:
A method, system and computer-readable media for searching a database and returning relevant results are disclosed. The method includes the steps of receiving a user query in one language, searching a database based on the user query to obtain one or more results, processing the results according to a local linguistic context association with the user query, and presenting to the user the results with an identifier for each result in which a local linguistic context around a location of the user query is in a second language.